Security Advisories (3)
CVE-2007-6341 (2008-02-08)

Allows remote attackers to cause a denial of service (program "croak") via a crafted DNS response.

CVE-2007-3409 (2007-06-26)

Net::DNS before 0.60, a Perl module, allows remote attackers to cause a denial of service (stack consumption) via a malformed compressed DNS packet with self-referencing pointers, which triggers an infinite loop.

CVE-2007-3377 (2007-06-25)

Header.pm in Net::DNS before 0.60, a Perl module, (1) generates predictable sequence IDs with a fixed increment and (2) can use the same starting ID for all child processes of a forking server, which allows remote attackers to spoof DNS responses, as originally reported for qpsmtp and spamassassin.

NAME

Net::DNS::Resolver::Recurse - Perform recursive dns lookups

SYNOPSIS

use Net::DNS::Resolver::Recurse;
my $res = Net::DNS::Resolver::Recurse->new;

DESCRIPTION

This module is a super class of Net::DNS::Resolver. So the methods for Net::DNS::Resolver still work for this module as well. There are just a couple methods added:

hints

Initialize the hint servers. Recursive queries need a starting name server to work off of. This method takes a list of IP addresses to use as the starting servers. These name servers should be authoritative for the root (.) zone.

$res->hints( @ips );

If no hints are passed, the default nameserver is asked for the hints. Normally these IPs can be obtained from the following location:

ftp://ftp.internic.net/domain/named.root

query_dorecursion

This method is much like the normal query() method except it disables the recurse flag in the packet and explicitly performs the recursion.

$packet = $res->query_dorecursion( "www.netscape.com.", "A");

AUTHOR

Rob Brown, bbb@cpan.org

SEE ALSO

Net::DNS::Resolver,

COPYRIGHT

Copyright (c) 2002, Rob Brown. All rights reserved.

This module is free software; you can redistribute it and/or modify it under the same terms as Perl itself.

$Id: Recurse.pm,v 1.3 2003/05/22 06:19:49 ctriv Exp $